Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Tidying Expert Marie Kondo: Cybersecurity Guru?
Oldest First  |  Newest First  |  Threaded View
The Governance Guru
100%
0%
The Governance Guru,
User Rank: Strategist
3/28/2019 | 4:11:43 PM
The Intrinsic Battle with Data Hygiene
There are many great responses to Curtis' reference of Marie Kondo's method being applied to tidying up data. However, many of them talk about keeping data for "what-if" scenarios or say that "nothing ever really happens with that useless data." This is where I have a fundamentally different view. I never really look at any data as "useless", no matter what it is. Marketing material from a campaign 10 years ago may seem delete-worthy, but what if your team decided to run a marketing campaign around the 10 year challenge and you needed to compare those materials with a present-day campaign. What companies need to do is get a true understanding of their data - what they have, where it lives, who has access, how it is being interacted with (data hygiene). From there they can make much more educated/strategic decisions about where data needs to go - archive, backup, active, etc. Modern day governance solutions are a great way to get this ball rolling. Thanks to the proliferation of the cloud, governance solutions can be deployed quickly, are efficient, and cost-effective. IMO this is a much better course of action than to ever simply purge old, "inactive" data.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
3/29/2019 | 2:17:33 PM
Re: The Intrinsic Battle with Data Hygiene
Delete worthy sounds like an actionable item right now --- I would call it STORAGE worthy.  Data per se may get old but it should be retained offsite and on good media.  This costs next to nothing really and is a good hedge.  YES you may never need it but if you keep it free of open office space per se, it is not visible clutter-  Inventory and note the lot of it and stuff it away secure.  I used to counsel against Lotus Notes email file having too much data clutter and too large.  That was a battle UNTIL A certain day in September 2001 when my datacenter crashed 103 floors to the ground along with the south tower.  THEN those lovely huge notes files had real valiue!!!!!  I never wanted to restrict any file size ever again.  Clutter can be good. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:33:10 PM
Data
"Holding on to data too long can be a liability, and getting rid of it too quickly can be a liability, This really makes sense. If you do not have the data nobody would ask for it.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:35:30 PM
Re: The Intrinsic Battle with Data Hygiene
However, many of them talk about keeping data for "what-if" scenarios or say that "nothing ever really happens with that useless data.This is the dilemma. We need data for analytics, but keeping the data in our environment carries a risk to us.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:36:40 PM
Re: The Intrinsic Battle with Data Hygiene
What companies need to do is get a true understanding of their data - what they have, where it lives, who has access, how it is being interacted with (data hygiene). Good strategy as long as you keep the data secured.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:38:18 PM
Re: The Intrinsic Battle with Data Hygiene
I would call it STORAGE worthy. Data per se may get old but it should be retained offsite and on good media. That makes sense. It should also be protected. Sometimes offsite may pose additional risks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:39:38 PM
Re: The Intrinsic Battle with Data Hygiene
THEN those lovely huge notes files had real valiue!!!!! That makes sense. Sometime we could not really re-generate data we need.
michaelmaloney
50%
50%
michaelmaloney,
User Rank: Apprentice
4/9/2019 | 3:54:54 AM
Get up and get at it
What one really needs in order to sit down and actually get your stuff in order, is to actually sit down and get your stuff in order. I don't deny that Marie Kondo has got a good system for getting things started though. It's nice to have a little bit of instruction and direction so that you know how to start with the big pile of mess. But at the end of the day, there's no easy fix or cure to the situation if you don't do something about it all!


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23478
PUBLISHED: 2021-09-22
Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
CVE-2020-23481
PUBLISHED: 2021-09-22
CMS Made Simple 2.2.14 was discovered to contain a cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Field Definition text field.
CVE-2020-23469
PUBLISHED: 2021-09-22
gmate v0.12+bionic contains a regular expression denial of service (ReDoS) vulnerability in the gedit3 plugin.
CVE-2021-21991
PUBLISHED: 2021-09-22
The vCenter Server contains a local privilege escalation vulnerability due to the way it handles session tokens. A malicious actor with non-administrative user access on vCenter Server host may exploit this issue to escalate privileges to Administrator on the vSphere Client (HTML5) or vCenter Server...
CVE-2021-21992
PUBLISHED: 2021-09-22
The vCenter Server contains a denial-of-service vulnerability due to improper XML entity parsing. A malicious actor with non-administrative user access to the vCenter Server vSphere Client (HTML5) or vCenter Server vSphere Web Client (FLEX/Flash) may exploit this issue to create a denial-of-service ...